SlideShare a Scribd company logo
Jeff Ware
March 12th, 2013
   IT in your business
    ◦ The value of data
    ◦ The value of connectivity
   Backups
    ◦ Planning for the worst
   The cloud is not always the answer
   PCI-DSS
   Q&A
   Started with CBM at 14
   Electrical Engineering/
    Computer Science
    Background
   Worked at CNN & theatres.
    Learned other aspects of live
    events.
   Fell in love with food thanks
    to this job
   Founded in 1980 as a hot
    dog stand
   Catering spun off into
    separate company in 1991
   Peak revenue of $17 Million
   90 FT & 130 PT Employees
   45% Full Service / 35% On
    Premise / 20% Delivery
   Largest event $1.3 million
   Focused on food quality
    above all else
   Poor facility design
    challenges efficiency
   Non Chicago address is a
    marketing struggle
   10 Servers
   3 DVRs
   2 PBXs
   4 T1s & 1 50/10 Cable
   GFS Backup
    ◦ Tapes – Offline
    ◦ SAN – Online
   Only 1 critical app in the
    cloud
   PCI DSS Compliant
How do you use IT?
   Communicate with
    ◦   Potential Customers
    ◦   Current Customers
    ◦   Vendors
    ◦   Staff
   Receive $ and Pay $
   Research
   Marketing
   Purchasing
   Cooking
A study from CIO
Insight found
improving the
manageability of
corporate data by
10% each year
would increase total
sales by $55,900
per employee
How productive are you
          When your not connected?
Superheroes need it, police rely on it and
everyone that uses a computer should use
some form of it
1.   Mission Critical
2.   Business Critical
3.   Essential
4.   Consequential
5.   Non-Critical
6.   Inconsequential
7.   Disposable
1.   Full Backup
2.   Incremental Backup
3.   Differential Backup
4.   Mirror Backup
5.   Full Computer Backup/Image
1.   Local
2.   Offsite (Offline)
3.   Online
4.   Remote
5.   Cloud
Test Restorations

Use Multiple Destinations
1.   Security & Privacy
2.   Dependency (Loss of control)
3.   Cost
4.   Decreased Flexibility
5.   Knowledge and Integration
   Build and Maintain a Secure Network
   Protect Cardholder Data
   Maintain a Vulnerability Management Program
   Implement Strong Access Control Measures
   Regularly Monitor and Test Networks
   Maintain an Information Security Policy
To download a copy of this presentation, go to:
         slideshare.net/CateringChicago

                     Jeff Ware
jware@CateringByMichaels.com     |   (847) 966-6555

More Related Content

Viewers also liked

Push Pop Craze Recipes
Push Pop Craze RecipesPush Pop Craze Recipes
Push Pop Craze Recipes
Catering By Michaels
 
φτώχεια και πείνα_συνοδευτικό_υλικό
φτώχεια και πείνα_συνοδευτικό_υλικόφτώχεια και πείνα_συνοδευτικό_υλικό
φτώχεια και πείνα_συνοδευτικό_υλικό
Renos Pattis
 
Culinary R&D
Culinary R&DCulinary R&D
Culinary R&D
Catering By Michaels
 
Ict basic principles
Ict basic principlesIct basic principles
Ict basic principles
Renos Pattis
 
Selection
SelectionSelection
Flyer concur travel expense
Flyer concur travel expenseFlyer concur travel expense
Flyer concur travel expense
Elliot Lazarus
 
Ben Holmes at TechChill Baltics, February 12th, 2013
Ben Holmes at TechChill Baltics, February 12th, 2013Ben Holmes at TechChill Baltics, February 12th, 2013
Ben Holmes at TechChill Baltics, February 12th, 2013
TechChillBaltics
 
Chanel
ChanelChanel

Viewers also liked (9)

Push Pop Craze Recipes
Push Pop Craze RecipesPush Pop Craze Recipes
Push Pop Craze Recipes
 
φτώχεια και πείνα_συνοδευτικό_υλικό
φτώχεια και πείνα_συνοδευτικό_υλικόφτώχεια και πείνα_συνοδευτικό_υλικό
φτώχεια και πείνα_συνοδευτικό_υλικό
 
Culinary R&D
Culinary R&DCulinary R&D
Culinary R&D
 
Ict basic principles
Ict basic principlesIct basic principles
Ict basic principles
 
Selection
SelectionSelection
Selection
 
Flyer concur travel expense
Flyer concur travel expenseFlyer concur travel expense
Flyer concur travel expense
 
Ben Holmes at TechChill Baltics, February 12th, 2013
Ben Holmes at TechChill Baltics, February 12th, 2013Ben Holmes at TechChill Baltics, February 12th, 2013
Ben Holmes at TechChill Baltics, February 12th, 2013
 
الحب
الحبالحب
الحب
 
Chanel
ChanelChanel
Chanel
 

Similar to It

Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
UL Transaction Security
 
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
GWAVA
 
Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration Path
Fadi Semaan
 
Big Data Monetisation
Big Data MonetisationBig Data Monetisation
Big Data Monetisation
PSD Group Ltd
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
Bill Clark
 
IT Trends through the Lens of Buyer Personas
IT Trends through the Lens of Buyer Personas IT Trends through the Lens of Buyer Personas
IT Trends through the Lens of Buyer Personas
CompTIA
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
Array Networks
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
tcarrucan
 
Cisco connect Felipe Lamus
Cisco connect Felipe LamusCisco connect Felipe Lamus
Cisco connect Felipe Lamus
Felipe Lamus
 
LTE Broadband Adoption in the Philippines
LTE Broadband Adoption in the PhilippinesLTE Broadband Adoption in the Philippines
LTE Broadband Adoption in the Philippines
Francisco "Cocoy" Claravall
 
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan TurchinService Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
PeopleReign, Inc.
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
AppSense
 
Jim Noble SEASIM Keynote
Jim Noble SEASIM KeynoteJim Noble SEASIM Keynote
Jim Noble SEASIM Keynote
SeattleSIM
 
Guide to design_global_infrastructure
Guide to design_global_infrastructureGuide to design_global_infrastructure
Guide to design_global_infrastructure
Accenture
 
Getting good value from IT
Getting good value from ITGetting good value from IT
Getting good value from IT
Co-Operative Systems
 
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Felipe Lamus
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Fraser Henderson
 
Achieving New Heights for China's Broadcasting Industry
Achieving New Heights for China's Broadcasting IndustryAchieving New Heights for China's Broadcasting Industry
Achieving New Heights for China's Broadcasting Industry
Cisco Service Provider
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
Castlebridge Associates
 

Similar to It (20)

Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
 
Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration Path
 
Big Data Monetisation
Big Data MonetisationBig Data Monetisation
Big Data Monetisation
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
 
IT Trends through the Lens of Buyer Personas
IT Trends through the Lens of Buyer Personas IT Trends through the Lens of Buyer Personas
IT Trends through the Lens of Buyer Personas
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Cisco connect Felipe Lamus
Cisco connect Felipe LamusCisco connect Felipe Lamus
Cisco connect Felipe Lamus
 
LTE Broadband Adoption in the Philippines
LTE Broadband Adoption in the PhilippinesLTE Broadband Adoption in the Philippines
LTE Broadband Adoption in the Philippines
 
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan TurchinService Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Jim Noble SEASIM Keynote
Jim Noble SEASIM KeynoteJim Noble SEASIM Keynote
Jim Noble SEASIM Keynote
 
Guide to design_global_infrastructure
Guide to design_global_infrastructureGuide to design_global_infrastructure
Guide to design_global_infrastructure
 
Getting good value from IT
Getting good value from ITGetting good value from IT
Getting good value from IT
 
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Achieving New Heights for China's Broadcasting Industry
Achieving New Heights for China's Broadcasting IndustryAchieving New Heights for China's Broadcasting Industry
Achieving New Heights for China's Broadcasting Industry
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
 

More from Catering By Michaels

Sales, operations & the comedy of collaborating with your spouse!
Sales, operations & the comedy of collaborating with your spouse!Sales, operations & the comedy of collaborating with your spouse!
Sales, operations & the comedy of collaborating with your spouse!
Catering By Michaels
 
Spicy Tuna Maki Roll Recipe
Spicy Tuna Maki Roll RecipeSpicy Tuna Maki Roll Recipe
Spicy Tuna Maki Roll Recipe
Catering By Michaels
 
Sushi 101
Sushi 101Sushi 101
Designing Chaferless Buffets
Designing Chaferless BuffetsDesigning Chaferless Buffets
Designing Chaferless Buffets
Catering By Michaels
 
The Push Pop Craze
The Push Pop CrazeThe Push Pop Craze
The Push Pop Craze
Catering By Michaels
 
Kendall MICE Presentation
Kendall MICE PresentationKendall MICE Presentation
Kendall MICE Presentation
Catering By Michaels
 
Social Media
Social MediaSocial Media
Social Media
Catering By Michaels
 
Recipe Pricing
Recipe PricingRecipe Pricing
Recipe Pricing
Catering By Michaels
 
Forms and systems
Forms and systemsForms and systems
Forms and systems
Catering By Michaels
 
Truffles and flourishes
Truffles and flourishesTruffles and flourishes
Truffles and flourishes
Catering By Michaels
 
Packing and shipping
Packing and shippingPacking and shipping
Packing and shipping
Catering By Michaels
 

More from Catering By Michaels (11)

Sales, operations & the comedy of collaborating with your spouse!
Sales, operations & the comedy of collaborating with your spouse!Sales, operations & the comedy of collaborating with your spouse!
Sales, operations & the comedy of collaborating with your spouse!
 
Spicy Tuna Maki Roll Recipe
Spicy Tuna Maki Roll RecipeSpicy Tuna Maki Roll Recipe
Spicy Tuna Maki Roll Recipe
 
Sushi 101
Sushi 101Sushi 101
Sushi 101
 
Designing Chaferless Buffets
Designing Chaferless BuffetsDesigning Chaferless Buffets
Designing Chaferless Buffets
 
The Push Pop Craze
The Push Pop CrazeThe Push Pop Craze
The Push Pop Craze
 
Kendall MICE Presentation
Kendall MICE PresentationKendall MICE Presentation
Kendall MICE Presentation
 
Social Media
Social MediaSocial Media
Social Media
 
Recipe Pricing
Recipe PricingRecipe Pricing
Recipe Pricing
 
Forms and systems
Forms and systemsForms and systems
Forms and systems
 
Truffles and flourishes
Truffles and flourishesTruffles and flourishes
Truffles and flourishes
 
Packing and shipping
Packing and shippingPacking and shipping
Packing and shipping
 

Recently uploaded

Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
katiejasper96
 
IMG_20240615_091110.pdf dpboss guessing
IMG_20240615_091110.pdf dpboss  guessingIMG_20240615_091110.pdf dpboss  guessing
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium PresentationKirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip
 
Enhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: IntroductionEnhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: Introduction
Cor Verdouw
 
CULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for dukeCULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for duke
ZevinAttisha
 
Prescriptive analytics BA4206 Anna University PPT
Prescriptive analytics BA4206 Anna University PPTPrescriptive analytics BA4206 Anna University PPT
Prescriptive analytics BA4206 Anna University PPT
Freelance
 
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
essorprof62
 
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
ISONIKELtd
 
The Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac SignThe Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac Sign
my Pandit
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
IPLTech Electric
 
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
Ksquare Energy Pvt. Ltd.
 
Discover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling ServiceDiscover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling Service
obriengroupinc04
 
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
valvereliz227
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Stone Art Hub
 
Cover Story - China's Investment Leader - Dr. Alyce SU
Cover Story - China's Investment Leader - Dr. Alyce SUCover Story - China's Investment Leader - Dr. Alyce SU
Cover Story - China's Investment Leader - Dr. Alyce SU
msthrill
 
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
Cambridge Product Management Network
 
Lukas Rycek - GreenChemForCE - project structure.pptx
Lukas Rycek - GreenChemForCE - project structure.pptxLukas Rycek - GreenChemForCE - project structure.pptx
Lukas Rycek - GreenChemForCE - project structure.pptx
pavelborek
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
Arijit Dutta
 

Recently uploaded (20)

Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
 
IMG_20240615_091110.pdf dpboss guessing
IMG_20240615_091110.pdf dpboss  guessingIMG_20240615_091110.pdf dpboss  guessing
IMG_20240615_091110.pdf dpboss guessing
 
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium PresentationKirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
 
Enhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: IntroductionEnhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: Introduction
 
CULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for dukeCULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for duke
 
Prescriptive analytics BA4206 Anna University PPT
Prescriptive analytics BA4206 Anna University PPTPrescriptive analytics BA4206 Anna University PPT
Prescriptive analytics BA4206 Anna University PPT
 
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
 
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
 
The Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac SignThe Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac Sign
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
 
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
 
Discover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling ServiceDiscover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling Service
 
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
 
Cover Story - China's Investment Leader - Dr. Alyce SU
Cover Story - China's Investment Leader - Dr. Alyce SUCover Story - China's Investment Leader - Dr. Alyce SU
Cover Story - China's Investment Leader - Dr. Alyce SU
 
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
 
Lukas Rycek - GreenChemForCE - project structure.pptx
Lukas Rycek - GreenChemForCE - project structure.pptxLukas Rycek - GreenChemForCE - project structure.pptx
Lukas Rycek - GreenChemForCE - project structure.pptx
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
 

It

  • 2. IT in your business ◦ The value of data ◦ The value of connectivity  Backups ◦ Planning for the worst  The cloud is not always the answer  PCI-DSS  Q&A
  • 3. Started with CBM at 14  Electrical Engineering/ Computer Science Background  Worked at CNN & theatres. Learned other aspects of live events.  Fell in love with food thanks to this job
  • 4. Founded in 1980 as a hot dog stand  Catering spun off into separate company in 1991  Peak revenue of $17 Million  90 FT & 130 PT Employees  45% Full Service / 35% On Premise / 20% Delivery
  • 5. Largest event $1.3 million  Focused on food quality above all else  Poor facility design challenges efficiency  Non Chicago address is a marketing struggle
  • 6. 10 Servers  3 DVRs  2 PBXs  4 T1s & 1 50/10 Cable  GFS Backup ◦ Tapes – Offline ◦ SAN – Online  Only 1 critical app in the cloud  PCI DSS Compliant
  • 7. How do you use IT?
  • 8. Communicate with ◦ Potential Customers ◦ Current Customers ◦ Vendors ◦ Staff  Receive $ and Pay $  Research  Marketing  Purchasing  Cooking
  • 9.
  • 10. A study from CIO Insight found improving the manageability of corporate data by 10% each year would increase total sales by $55,900 per employee
  • 11.
  • 12. How productive are you When your not connected?
  • 13. Superheroes need it, police rely on it and everyone that uses a computer should use some form of it
  • 14. 1. Mission Critical 2. Business Critical 3. Essential 4. Consequential 5. Non-Critical 6. Inconsequential 7. Disposable
  • 15. 1. Full Backup 2. Incremental Backup 3. Differential Backup 4. Mirror Backup 5. Full Computer Backup/Image
  • 16. 1. Local 2. Offsite (Offline) 3. Online 4. Remote 5. Cloud
  • 18.
  • 19. 1. Security & Privacy 2. Dependency (Loss of control) 3. Cost 4. Decreased Flexibility 5. Knowledge and Integration
  • 20.
  • 21.
  • 22. Build and Maintain a Secure Network  Protect Cardholder Data  Maintain a Vulnerability Management Program  Implement Strong Access Control Measures  Regularly Monitor and Test Networks  Maintain an Information Security Policy
  • 23. To download a copy of this presentation, go to: slideshare.net/CateringChicago Jeff Ware jware@CateringByMichaels.com | (847) 966-6555

Editor's Notes

  1. Your business data is growingDigital data is rapidly growing at a rate of 80% each year, and businesses like yours are responsible for maintaining 85% of that information.Data loss happensHard drive crashes, spilled drinks, and accidental file deletion can occur at any time and put your company’s future in jeopardy. In fact, 93% of all companies that suffer significant data loss close down within 5 years!
  2. What's the value of your organization's data?The ability of business and IT managers to answer that question directly correlates to the success of their company's business continuity and data recovery efforts. The answer is difficult to provide, given the massive amounts of data coursing through organizations and the fact that the value of data changes frequently and quickly in today's unpredictable, highly competitive, and increasingly regulated business environment.
  3. In the world of mainframes and microchips it's called data backup or data recovery and it can mean the difference between a slight computer setback and living through your own electronic apocalypse.Let's face it; our computers are a bigger part of life than ever before. We shop, work and play using computers. They've replaced stereos, encyclopedias, even the mailman. They've become journals, photo albums and canvases for our art.But computers aren't perfect. Files become corrupt, motherboards malfunction, CPUs call it quits taking our precious data with them."My computer won't crash." You've had your computer this long and haven't had problems so far why worry about computer backup now? Data backup is about protecting your data's future, but with computers, it isn't if you crash, it's when you crash.In today's high-tech world of sneaky spyware and venomous viruses, you are in more danger of data loss than ever before. Computer viruses grew by as much as 11% percent during 2003 alone.*Like tires on your car, the electronic circuits your computer rides on will eventually wear down and blow out. When this happens, you can either grieve at your loss or simply restore your data with data backup software.
  4. 1. Mission Critical: Frequently used, immediate availability, significant and immediate financial impact, significant and immediate operational impact, eventual compliance impact.2. Business Critical: Regularly used, reasonably available, significant long-term financial impact, significant operational impact over time, eventual compliance impact.3. Essential: Periodically used, available within defined timeframe, potential long-term financial impact, probable operational impact over time, probable compliance issues.4. Consequential: Occasionally used, available within extended timeframe, possible but not likely financial impact, possible operational impact over time, probable compliance issues.5. Non-Critical: Rarely used, limited availability, unlikely financial impact, doubtful operational impact over time, potential compliance impact.6. Inconsequential: Used only on request, limited availability, no financial impact, doubtful operational impact over time, potential compliance impact.7. Disposable: Never used, no need for availability, no financial impact, no operational impact, no expected compliance impact.Mission-critical data might include quarterly expense figures and a list of addresses of key suppliers - or it might not. Each organization will define the value of its data in a different way. The management team for a national restaurant chain, for example, might be perfectly fine with being able to recover transaction data from its sole New York location within two to three days of an outage or disaster. A Wall Street investment firm, on the other hand, would likely define its transaction data as mission critical. The financial services firm and the restaurant chain face different types of regulatory demands - all of which should be reviewed in the data valuation process.
  5. Full BackupFull backup is a method of backup where all the files and folders selected for the backup will be backed up.  When subsequent backups are run, the entire list of files and will be backed up again. The advantage of this backup is restores are fast and easy as the complete list of files are stored each time. The disadvantage is that each backup run is time consuming as the entire list of files is copied again.  Also, full backups take up a lot more storage space when compared to incremental or differential backups. Incremental backupIncremental backup is a backup of all changes made since the last backup. With incremental backups, one full backup is done first and subsequent backup runs are just the changes made since the last backup. The result is a much faster backup then a full backup for each backup run. Storage space used is much less than a full backup and less then with differential backups. Restores are slower than with a full backup and a differential backup. Differential backupDifferential backup is a backup of all changes made since the last full backup. With differential backups, one full backup is done first and subsequent backup runs are the changes made since the last full backup. The result is a much faster backup then a full backup for each backup run. Storage space used is much less than a full backup but more then with Incremental backups. Restores are slower than with a full backup but usually faster then with Incremental backups. Mirror BackupMirror backups are as the name suggests a mirror of the source being backed up. With mirror backups, when a file in the source is deleted, that file is eventually also deleted in the mirror backup. Because of this, mirror backups should be used with caution as a file that is deleted by accident or through a virus may also cause the mirror backups to be deleted as well. Full PC Backup – Image In this backup, it is not the individual files that are backed up but entire images of the hard drives of the computer that is backed up.  With the full PC backup, you can restore the computer hard drives to its exact state when the backup was done. With the Full PC backup, not only can the work documents, picture, videos and audio files be restored but the operating system, hard ware drivers, system files, registry, programs, emails etc can also be restored. 
  6. Local BackupLocal backups are any kind of backup where the storage medium is kept close at hand or in the same building as the source. It could be a backup done on a second internal hard drive, an attached external hard drive, CD/ DVD –ROM or Network Attached Storage (NAS). Local backups protect digital content from hard drive failures and virus attacks. They also provide protection from accidental mistakes or deletes. Since the backups are always close at hand they are fast and convenient to restore. Offsite BackupWhen the backup storage media is kept at a different geographic location from the source, this is known as an offsite backup. The backup may be done locally at first but once the storage medium is brought to another location, it becomes an offsite backup.  Examples of offsite backup include taking the backup media or hard drive home, to another office building or to a bank safe deposit box.Beside the same protection offered by local backups, offsite backups provide additional protection from theft, fire, floods and other natural disasters. Putting the backup media in the next room as the source would not be considered an offsite backup as the backup does not offer protection from theft, fire, floods and other natural disasters. Online BackupThese are backups that are ongoing or done continuously or frequently to a storage medium that is always connected to the source being backed up.  Typically the storage medium is located offsite and connected to the backup source by a network or Internet connection. It does not involve human intervention to plug in drives and storage media for backups to run. Many commercial data centres now offer this as a subscription service to consumers. The storage data centres are located away from the source being backed up and the data is sent from the source to the storage data centre securely over the Internet. Remote BackupRemote backups are a form of offsite backup with a difference being that you can access, restore or administer the backups while located at your source location or other location. You do not need to be physically present at the backup storage facility to access the backups.  For example, putting your backup hard drive at your bank safe deposit box would not be considered a remote backup. You cannot administer it without making a trip to the bank. Online backups are usually considered remote backups as well. Cloud BackupThis term is often used interchangeably with Online Backup and Remote Backup.  It is where data is backed up to a service or storage facility connected over the Internet. With the proper login credentials, that backup can then be accessed or restored from any other computer with Internet Access. 
  7. Using multiple destinations is smart because it protects you from various kinds of failures (dead hard drives, flaky Internet connections) that might make any single destination unreachable. Personally, I like to use both a local hard drive (for speed) and a remote destination (for security).sometimes computers and humans make mistakes, and sometimes things break. You don't want to find out about a backup problem after you've lost data. To make sure everything's running smoothly (and to practice so you won't have to panic in an emergency), try restoring a few random files from time to time.
  8. Don’t need to talk about the Pros – they are nearly unlimitedThere are a few Cons
  9. 1. Fear of unavailability. As the industry of cloud computing is still evolving, most vendors are still upstarts and it will be hard to determine whether they will be around a long time. There are also fears of takeovers and buyouts. Because of this, the integrity and availability of your data may still be in question.2. Data ownership and data exchange. When your provider kicks the bucket or you decide to terminate your service, what would happen to your data then, will you be able to take it back and any copy erased from the provider’s databases? If you decide to change providers, how easy would it be to transfer all your data, will they be compatible with the new provider’s systems? These are certainly valid concerns and should be greatly considered when choosing vendors.3. Control. Since clients have little or no control of how their data is being handled, all they can do is trust their providers and maybe ask a few questions, which will most likely be answered by “Don’t worry, it’s in good hands”.
  10. PCI DSS is the global data security standard adopted by the payment card brands for all entities that process, store or transmit cardholder data. It consists of common sense steps that mirror security best practices.
  11. Build and Maintain a Secure Network1. Install and maintain a firewall configuration to protect cardholder data2. Do not use vendor-supplied defaults for system passwords and other security parametersProtect Cardholder Data 3. Protect stored cardholder data4. Encrypt transmission of cardholder data across open, public networksMaintain a Vulnerability Management Program5. Use and regularly update anti-virus software or programs6. Develop and maintain secure systems and applicationsImplement Strong Access Control Measures7. Restrict access to cardholder data by business need to know8. Assign a unique ID to each person with computer access9. Restrict physical access to cardholder dataRegularly Monitor and Test Networks10. Track and monitor all access to network resources and cardholder data11. Regularly test security systems and processesMaintain an Information Security Policy12. Maintain a policy that addresses information security for all personnel